Motorola RFS7000 RF Switch

CSV information

Status archived
Valid from 09.07.2009
Valid until 01.09.2019
Scheme 🇳🇴 NO
Manufacturer Motorola, Inc.
Category Access Control Devices and Systems
Security level EAL4+, ALC_FLR.2
Protection profiles

Heuristics summary

Certificate ID: SERTIT-010

Certificate

certificate could not be downloaded, no link is available.

Certification report

Extracted keywords

Protocols
SSH

Vendor
Microsoft

Security level
EAL 4, EAL1, EAL7, EAL 4 augmented
Security Assurance Requirements (SAR)
ALC_FLR.2
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SEL.1, FCS_BCM_EXP.1, FCS_CKM.1, FCS_CKM_EXP.2, FCS_CKM.4, FCS_COP_EXP.1, FCS_COP_EXP.2, FDP_PUD_EXP.1, FDP_RIP.1, FIA_AFL.1, FIA_ATD.1, FIA_UAU.1, FIA_UAU_EXP.5, FIA_UID.2, FIA_USB.1, FMT_MOF.1, FMT_MSA.2, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FPT_RVM.1, FPT_SEP.1, FPT_STM_EXP.1, FPT_TST_EXP.1, FPT_TST_EXP.2, FTA_SSL.3, FTA_TAB.1, FTP_ITC_EXP.1, FTP_TRP.1
Certificates
SERTIT-010

Standards
FIPS 140-2, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003, CCMB-2005-08-004

File metadata

Title tittel
Keywords ugradert
Author ragea
Creation date D:20090709131957+02'00'
Modification date D:20090709132004+02'00'
Pages 21
Creator Acrobat PDFMaker 8.1 for Word
Producer Adobe PDF Library 8.0

Security target

Extracted keywords

Symmetric Algorithms
AES, DES, CBC-MAC
Schemes
MAC, Key Exchange
Protocols
SSH, TLS, IKE
Randomness
PRNG, RNG
Block cipher modes
CBC, CCM

Trusted Execution Environments
SE

Security level
EAL4, EAL4 augmented
Claims
O.ACCESS, O.AUDIT_GENERATION, O.CORRECT_TSF_OPERATION, O.CRYPTOGRAPHY, O.CRYPTOGRAPHY_VALIDATED, O.DISPLAY_BANNER, O.MANAGE, O.MEDIATE, O.RESIDUAL_, O.SELF_PROTECTION, O.TIME_STAMPS, O.TOE_ACCESS, O.ADMIN_GUIDANCE, O.CONFIGURATION_, O.DOCUMENTED_, O.PARTIAL_, O.VULNERABILITY_, O.RESIDUAL_INFORMATIO, O.RESIDUAL_INFORMATION, O.CONFIGURATION_IDENTIF, O.DOCUMENTED_DESIGN, O.VULNERABILITY_ANALYSI, O.PARTIAL_FUNCTIONAL_, O.PARTIAL_FUNCTIONAL_T, O.CORRECT_, O.CRYPTOGRAPHY_VALID, O.CRYPTOGRAPHY_VALIDA, O.CRYPTOGRAPHY_VAL, O.DOCUMENTED_DESIG, O.PARTIAL_FUNCTIONA, O.VULNERABILITY_ANALYSIS, T.SIGNAL_DETECT, T.ACCIDENTAL_ADMIN_, T.ACCIDENTAL_, T.MASQUERADE, T.POOR_DESIGN, T.POOR_IMPLEMENTATION, T.POOR_TEST, T.RESIDUAL_DATA, T.TSF_COMPROMISE, T.UNATTENDED_, T.UNAUTHORIZED_, T.UNAUTH_ADMIN_ACCESS, T.ACCIDENTAL_CRYPTO_COM, T.UNATTENDED_SESSION, A.ADMINISTRATION, A.NO_EVIL, A.NO_GENERAL_PURPOSE, A.PHYSICAL, A.TOE_NO_BYPASS, A.NO_GENERAL_P, OE.ADMIN, OE.AUDIT_PROTECTION, OE.AUDIT_REVIEW, OE.MANAGE, OE.NO_EVIL, OE.NO_GENERAL_PURPOSE, OE.PHYSICAL, OE.PROTECT_MGMT_COMMS, OE.RESIDUAL_INFORMATION, OE.SELF_PROTECTION, OE.TIME_STAMPS, OE.TOE_ACCESS, OE.TOE_NO_BYPASS, OE.NO_GENERAL_PURPO, OE.NO_GENERAL_PURPOS, OE.RESIDUAL_INFORMATI, OE.RESIDUAL_INFORMATIO, OE.PROTECT_MGMT_COM, OE.PROTECT_MGMT_COMM, OE.NO_GENERAL_PURP, OE.PROTECT_MGMT_CO, OE.RESIDUAL_INFORMA
Security Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ACM_CAP.2, ACM_CAP.1, ACM_SCP.1, ADO_DEL.2, ADO_IGS.1, ADO_DEL.1, ADV_SPM.1, ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_FSP.1, ADV_HLD.1, AGD_ADM.1, AGD_USR.1, ALC_FLR.2, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ATE_COV.1, AVA_MSU.2, AVA_SOF.1, AVA_VLA.2, AVA_MSU.1, AVA_VLA.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SEL.1, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_STG.1, FAU_STG.3, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SEL.1.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3.1, FAU_STG, FCS_BCM_EXP.1, FCS_CKM.1, FCS_CKM_EXP.2, FCS_CKM.4, FCS_COP_EXP.1, FCS_COP_EXP.2, FCS_CKM.2, FCS_COP.1, FCS_BCM_EXP.1.1, FCS_BCM_EXP.1.2, FCS_BCM_EXP.1.3, FCS_CKM_EXP.2.1, FCS_COP_EXP.1.1, FCS_COP_EXP.2.1, FCS_COP, FCS_CKM, FDP_RIP.1, FDP_PUD_EXP.1, FDP_ACC.1, FDP_IFC.1, FDP_PUD, FDP_PUD_EXP.1.1, FDP_RIP.1.1, FDP_PUD_EXP, FDP_IFC, FDP_AFC, FDP_PUP_EXP.1, FIA_AFL.1, FIA_ATD.1, FIA_UAU.1, FIA_UID.1, FIA_UID.2, FIA_USB.1, FIA_UAU_EXP.5, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU_EXP.5.1, FIA_UAU_EXP.5.2, FIA_UAU, FIA_UAU.5.1, FIA_UID.2.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_UID.1.1, FIA_UID.1.2, FMT_MTD.1, FMT_MSA.2, FMT_MOF.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1, FMT_MOF.1.1, FMT_MSA.2.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA, FPT_STM.1, FPT_RVM.1, FPT_SEP.1, FPT_STM_EXP.1, FPT_TST_EXP.1, FPT_TST_EXP.2, FPT_RVM.1.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_STM_EXP.1.1, FPT_TST_EXP.1.1, FPT_TST_EXP.1.2, FPT_TST_EXP.1.3, FPT_TST_EXP.2.1, FPT_TST_EXP.2.2, FPT_STM.1.1, FPT_STM, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FTA_SSL.3, FTA_TAB.1, FTA_SSL.3.1, FTA_TAB.1.1, FTP_ITC.1, FTP_ITC, FTP_ITC_EXP.1, FTP_TRP.1, FTP_ITC_EXP.1.1, FTP_ITC_EXP.1.2, FTP_ITC_EXP.1.3, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3

Standards
FIPS 140-2, FIPS 140-1, FIPS 140, FIPS PUB 140-2, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003

File metadata

Author User
Creation date D:20090520174815
Modification date D:20090520174815
Pages 85
Creator Pdf995
Producer GPL Ghostscript 8.15

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

SERTIT-010

Extracted SARs

ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ALC_FLR.2, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.2, AVA_SOF.1, AVA_VLA.2

Similar certificates

Name Certificate ID
Motorola WS5100 Wireless Switch SERTIT-009 Compare

Scheme data

Product Motorola RFS7000 RF Switch
Url https://sertit.no/certified-products/product-archive/motorola-rfs7000-rf-switch
Category Other Devices and Systems
Developer Motorola, Inc.
Certification Date 09.07.2009
Enhanced
Description SERTIT-010 C
Cert Id SERTIT-010
Mutual Recognition CCRA, SOG-IS
Product HW: RFS7000; SW: RFS7000-1.0.0.0-022GR
Category Other Devices and Systems
Sponsor Motorola, Inc.
Developer Motorola, Inc.
Evaluation Facility Aspect Labs
Certification Date 09.07.2009
Level EAL 4, ALC_FLR.2
Protection Profile US Government Wireless Local Area Network (WLAN) Access System Protection Profile for Basic Robustness Environments, Version 1.0, April 2006
Documents frozendict({'target': [frozendict({'href': 'https://sertit.no/getfile.php/135534-1610011059/SERTIT/Sertifikater/2009/10/MOTOROLA_ST-v1.5.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/134620-1607949745/SERTIT/Sertifikater/2009/10/20090709_SERTIT-010_CR_v1_0.pdf'})]})

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Access Control Devices and Systems",
  "cert_link": null,
  "dgst": "360053f8c7550b7e",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "SERTIT-010",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL4+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_LLD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "a91e9c889e6f3e47"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "category": "Other Devices and Systems",
      "certification_date": "2009-07-09",
      "developer": "Motorola, Inc.",
      "enhanced": {
        "category": "Other Devices and Systems",
        "cert_id": "SERTIT-010",
        "certification_date": "2009-07-09",
        "description": "SERTIT-010 C",
        "developer": "Motorola, Inc.",
        "documents": {
          "report": [
            {
              "href": "https://sertit.no/getfile.php/134620-1607949745/SERTIT/Sertifikater/2009/10/20090709_SERTIT-010_CR_v1_0.pdf"
            }
          ],
          "target": [
            {
              "href": "https://sertit.no/getfile.php/135534-1610011059/SERTIT/Sertifikater/2009/10/MOTOROLA_ST-v1.5.pdf"
            }
          ]
        },
        "evaluation_facility": "Aspect Labs",
        "level": "EAL 4, ALC_FLR.2",
        "mutual_recognition": "CCRA, SOG-IS",
        "product": "HW: RFS7000; SW: RFS7000-1.0.0.0-022GR",
        "protection_profile": "US Government Wireless Local Area Network (WLAN) Access System Protection Profile for Basic Robustness Environments, Version 1.0, April 2006",
        "sponsor": "Motorola, Inc."
      },
      "product": "Motorola RFS7000 RF Switch",
      "url": "https://sertit.no/certified-products/product-archive/motorola-rfs7000-rf-switch"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Motorola, Inc.",
  "manufacturer_web": "https://www.motorola.com/",
  "name": "Motorola RFS7000 RF Switch",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2009-07-09",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "20090709_SERTIT-010_CR_v1_0.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "NO": {
          "SERTIT-010": 21
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.2": 24
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 27,
          "EAL 4 augmented": 23,
          "EAL1": 1,
          "EAL7": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 1,
          "FAU_GEN.2": 1,
          "FAU_SEL.1": 1
        },
        "FCS": {
          "FCS_BCM_EXP.1": 1,
          "FCS_CKM.1": 1,
          "FCS_CKM.4": 1,
          "FCS_CKM_EXP.2": 1,
          "FCS_COP_EXP.1": 1,
          "FCS_COP_EXP.2": 1
        },
        "FDP": {
          "FDP_PUD_EXP.1": 1,
          "FDP_RIP.1": 1
        },
        "FIA": {
          "FIA_AFL.1": 1,
          "FIA_ATD.1": 1,
          "FIA_UAU.1": 1,
          "FIA_UAU_EXP.5": 1,
          "FIA_UID.2": 1,
          "FIA_USB.1": 2
        },
        "FMT": {
          "FMT_MOF.1": 3,
          "FMT_MSA.2": 1,
          "FMT_MTD.1": 2,
          "FMT_SMF.1": 3,
          "FMT_SMR.1": 1
        },
        "FPT": {
          "FPT_RVM.1": 1,
          "FPT_SEP.1": 1,
          "FPT_STM_EXP.1": 1,
          "FPT_TST_EXP.1": 1,
          "FPT_TST_EXP.2": 1
        },
        "FTA": {
          "FTA_SSL.3": 1,
          "FTA_TAB.1": 1
        },
        "FTP": {
          "FTP_ITC_EXP.1": 1,
          "FTP_TRP.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 1
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2005-08-001": 1,
          "CCMB-2005-08-002": 1,
          "CCMB-2005-08-003": 1,
          "CCMB-2005-08-004": 1
        },
        "FIPS": {
          "FIPS 140-2": 6
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "ragea",
      "/CR issue": "1.0",
      "/CRNumber": "010",
      "/Company": "SERTIT",
      "/CreationDate": "D:20090709131957+02\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 8.1 for Word",
      "/Day Month Year": "9 July 2009",
      "/Developers name": "Motorola, Inc.",
      "/EAL": "EAL 4 augmented with ALC_FLR.2",
      "/ETR date final": "28 May 2009",
      "/Keywords": "ugradert",
      "/ModDate": "D:20090709132004+02\u002700\u0027",
      "/Name of EVIT": "Aspect Labs, a division of BKP Security, Inc.",
      "/PP name": "US Government Wireless Local Network Access System Protection Profile for Basic Robustness Environments",
      "/Prod name and version platform": "Motorola RFS7000 RF Switch",
      "/Producer": "Adobe PDF Library 8.0",
      "/Product name": "Motorola RFS7000 RF Switch",
      "/Product version": "HW: RFS7000 SW: RFS7000-1.0.0.0-022GR",
      "/Sponsor name": "Motorola, Inc.",
      "/Title": "tittel",
      "pdf_file_size_bytes": 475259,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 21
    },
    "st_filename": "MOTOROLA_ST-v1.5.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.ADMINISTRATION": 1,
          "A.NO_EVIL": 1,
          "A.NO_GENERAL_P": 1,
          "A.NO_GENERAL_PURPOSE": 1,
          "A.PHYSICAL": 1,
          "A.TOE_NO_BYPASS": 1
        },
        "O": {
          "O.ACCESS": 1,
          "O.ADMIN_GUIDANCE": 6,
          "O.AUDIT_GENERATION": 4,
          "O.CONFIGURATION_": 4,
          "O.CONFIGURATION_IDENTIF": 2,
          "O.CORRECT_": 3,
          "O.CORRECT_TSF_OPERATION": 1,
          "O.CRYPTOGRAPHY": 8,
          "O.CRYPTOGRAPHY_VAL": 1,
          "O.CRYPTOGRAPHY_VALID": 2,
          "O.CRYPTOGRAPHY_VALIDA": 2,
          "O.CRYPTOGRAPHY_VALIDATED": 1,
          "O.DISPLAY_BANNER": 4,
          "O.DOCUMENTED_": 2,
          "O.DOCUMENTED_DESIG": 1,
          "O.DOCUMENTED_DESIGN": 3,
          "O.MANAGE": 10,
          "O.MEDIATE": 6,
          "O.PARTIAL_": 1,
          "O.PARTIAL_FUNCTIONA": 1,
          "O.PARTIAL_FUNCTIONAL_": 2,
          "O.PARTIAL_FUNCTIONAL_T": 2,
          "O.RESIDUAL_": 5,
          "O.RESIDUAL_INFORMATIO": 1,
          "O.RESIDUAL_INFORMATION": 4,
          "O.SELF_PROTECTION": 6,
          "O.TIME_STAMPS": 4,
          "O.TOE_ACCESS": 10,
          "O.VULNERABILITY_": 5,
          "O.VULNERABILITY_ANALYSI": 3,
          "O.VULNERABILITY_ANALYSIS": 1
        },
        "OE": {
          "OE.ADMIN": 1,
          "OE.AUDIT_PROTECTION": 4,
          "OE.AUDIT_REVIEW": 4,
          "OE.MANAGE": 8,
          "OE.NO_EVIL": 7,
          "OE.NO_GENERAL_PURP": 1,
          "OE.NO_GENERAL_PURPO": 1,
          "OE.NO_GENERAL_PURPOS": 1,
          "OE.NO_GENERAL_PURPOSE": 2,
          "OE.PHYSICAL": 3,
          "OE.PROTECT_MGMT_CO": 1,
          "OE.PROTECT_MGMT_COM": 1,
          "OE.PROTECT_MGMT_COMM": 1,
          "OE.PROTECT_MGMT_COMMS": 1,
          "OE.RESIDUAL_INFORMA": 1,
          "OE.RESIDUAL_INFORMATI": 3,
          "OE.RESIDUAL_INFORMATIO": 2,
          "OE.RESIDUAL_INFORMATION": 1,
          "OE.SELF_PROTECTION": 6,
          "OE.TIME_STAMPS": 4,
          "OE.TOE_ACCESS": 8,
          "OE.TOE_NO_BYPASS": 7
        },
        "T": {
          "T.ACCIDENTAL_": 1,
          "T.ACCIDENTAL_ADMIN_": 2,
          "T.ACCIDENTAL_CRYPTO_COM": 1,
          "T.MASQUERADE": 2,
          "T.POOR_DESIGN": 2,
          "T.POOR_IMPLEMENTATION": 2,
          "T.POOR_TEST": 2,
          "T.RESIDUAL_DATA": 2,
          "T.SIGNAL_DETECT": 1,
          "T.TSF_COMPROMISE": 2,
          "T.UNATTENDED_": 1,
          "T.UNATTENDED_SESSION": 1,
          "T.UNAUTHORIZED_": 1,
          "T.UNAUTH_ADMIN_ACCESS": 2
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_AUT.1": 2,
          "ACM_CAP.1": 1,
          "ACM_CAP.2": 1,
          "ACM_CAP.4": 2,
          "ACM_SCP.1": 1,
          "ACM_SCP.2": 2
        },
        "ADO": {
          "ADO_DEL.1": 2,
          "ADO_DEL.2": 2,
          "ADO_IGS.1": 3
        },
        "ADV": {
          "ADV_FSP.1": 1,
          "ADV_FSP.2": 2,
          "ADV_HLD.1": 1,
          "ADV_HLD.2": 2,
          "ADV_IMP.1": 2,
          "ADV_LLD.1": 2,
          "ADV_RCR.1": 6,
          "ADV_SPM.1": 3
        },
        "AGD": {
          "AGD_ADM.1": 6,
          "AGD_USR.1": 3
        },
        "ALC": {
          "ALC_DVS.1": 2,
          "ALC_FLR.2": 8,
          "ALC_LCD.1": 2,
          "ALC_TAT.1": 2
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_COV.2": 2,
          "ATE_DPT.1": 2,
          "ATE_FUN.1": 2,
          "ATE_IND.2": 4
        },
        "AVA": {
          "AVA_MSU.1": 2,
          "AVA_MSU.2": 2,
          "AVA_SOF.1": 5,
          "AVA_VLA.1": 3,
          "AVA_VLA.2": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 9,
          "EAL4 augmented": 2
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 23,
          "FAU_GEN.1.1": 4,
          "FAU_GEN.1.2": 2,
          "FAU_GEN.2": 10,
          "FAU_SAR.1": 8,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.2": 5,
          "FAU_SAR.2.1": 1,
          "FAU_SAR.3": 5,
          "FAU_SAR.3.1": 1,
          "FAU_SEL.1": 7,
          "FAU_SEL.1.1": 1,
          "FAU_STG": 1,
          "FAU_STG.1": 4,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1,
          "FAU_STG.3": 6,
          "FAU_STG.3.1": 1
        },
        "FCS": {
          "FCS_BCM_EXP.1": 11,
          "FCS_BCM_EXP.1.1": 1,
          "FCS_BCM_EXP.1.2": 1,
          "FCS_BCM_EXP.1.3": 1,
          "FCS_CKM": 1,
          "FCS_CKM.1": 16,
          "FCS_CKM.2": 5,
          "FCS_CKM.4": 15,
          "FCS_CKM_EXP.2": 16,
          "FCS_CKM_EXP.2.1": 1,
          "FCS_COP": 2,
          "FCS_COP.1": 3,
          "FCS_COP_EXP.1": 16,
          "FCS_COP_EXP.1.1": 1,
          "FCS_COP_EXP.2": 23,
          "FCS_COP_EXP.2.1": 2
        },
        "FDP": {
          "FDP_ACC.1": 1,
          "FDP_AFC": 1,
          "FDP_IFC": 1,
          "FDP_IFC.1": 1,
          "FDP_PUD": 1,
          "FDP_PUD_EXP": 2,
          "FDP_PUD_EXP.1": 8,
          "FDP_PUD_EXP.1.1": 1,
          "FDP_PUP_EXP.1": 1,
          "FDP_RIP.1": 15,
          "FDP_RIP.1.1": 2
        },
        "FIA": {
          "FIA_AFL.1": 15,
          "FIA_AFL.1.1": 2,
          "FIA_AFL.1.2": 2,
          "FIA_ATD.1": 15,
          "FIA_ATD.1.1": 2,
          "FIA_UAU": 4,
          "FIA_UAU.1": 16,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.5.1": 1,
          "FIA_UAU_EXP.5": 14,
          "FIA_UAU_EXP.5.1": 2,
          "FIA_UAU_EXP.5.2": 2,
          "FIA_UID.1": 12,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1,
          "FIA_UID.2": 11,
          "FIA_UID.2.1": 1,
          "FIA_USB.1": 14,
          "FIA_USB.1.1": 2,
          "FIA_USB.1.2": 2,
          "FIA_USB.1.3": 2
        },
        "FMT": {
          "FMT_MOF.1": 29,
          "FMT_MOF.1.1": 4,
          "FMT_MSA": 1,
          "FMT_MSA.1": 1,
          "FMT_MSA.2": 15,
          "FMT_MSA.2.1": 1,
          "FMT_MTD.1": 33,
          "FMT_MTD.1.1": 5,
          "FMT_SMF.1": 34,
          "FMT_SMF.1.1": 5,
          "FMT_SMR.1": 24,
          "FMT_SMR.1.1": 2,
          "FMT_SMR.1.2": 2
        },
        "FPT": {
          "FPT_RVM.1": 12,
          "FPT_RVM.1.1": 2,
          "FPT_SEP.1": 12,
          "FPT_SEP.1.1": 2,
          "FPT_SEP.1.2": 2,
          "FPT_STM": 1,
          "FPT_STM.1": 10,
          "FPT_STM.1.1": 1,
          "FPT_STM_EXP.1": 8,
          "FPT_STM_EXP.1.1": 1,
          "FPT_TST.1": 1,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST_EXP.1": 9,
          "FPT_TST_EXP.1.1": 1,
          "FPT_TST_EXP.1.2": 1,
          "FPT_TST_EXP.1.3": 1,
          "FPT_TST_EXP.2": 8,
          "FPT_TST_EXP.2.1": 1,
          "FPT_TST_EXP.2.2": 1
        },
        "FTA": {
          "FTA_SSL.3": 8,
          "FTA_SSL.3.1": 1,
          "FTA_TAB.1": 5,
          "FTA_TAB.1.1": 1
        },
        "FTP": {
          "FTP_ITC": 1,
          "FTP_ITC.1": 3,
          "FTP_ITC_EXP.1": 17,
          "FTP_ITC_EXP.1.1": 3,
          "FTP_ITC_EXP.1.2": 2,
          "FTP_ITC_EXP.1.3": 2,
          "FTP_TRP.1": 8,
          "FTP_TRP.1.1": 1,
          "FTP_TRP.1.2": 1,
          "FTP_TRP.1.3": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        },
        "CCM": {
          "CCM": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 1
        },
        "SSH": {
          "SSH": 6
        },
        "TLS": {
          "TLS": {
            "TLS": 1
          }
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 1
        },
        "MAC": {
          "MAC": 3
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "PRNG": 1
        },
        "RNG": {
          "RNG": 2
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2005-08-001": 1,
          "CCMB-2005-08-002": 1,
          "CCMB-2005-08-003": 1
        },
        "FIPS": {
          "FIPS 140": 1,
          "FIPS 140-1": 1,
          "FIPS 140-2": 13,
          "FIPS PUB 140-2": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 5
          }
        },
        "DES": {
          "DES": {
            "DES": 4
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SE": 1
        }
      },
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "User",
      "/CreationDate": "D:20090520174815",
      "/Creator": "Pdf995",
      "/Keywords": "",
      "/ModDate": "D:20090520174815",
      "/Producer": "GPL Ghostscript 8.15",
      "/Subject": "",
      "/Title": "",
      "pdf_file_size_bytes": 546993,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 85
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_as_br_v1.0.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20090709_SERTIT-010_CR_v1_0.pdf",
  "scheme": "NO",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "ALC_FLR.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/MOTOROLA_ST-v1.5.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "3a96710e504235824ba3f6b3c5f1716dd79d5eb41c10fff6d6d5a6315d475e60",
      "txt_hash": "280e400432f2c6fe2eb2c108e0245eec8682112e4f996b91619525cb69ba2c97"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "ad7fd478b9259fad2f9054f6b506ff00c74ec3ca728e4c275a1cdb079efe383e",
      "txt_hash": "46a05a8a3fc67f2458d655047cc8ebd95871bb350b074f285eab56ba13e96c5c"
    }
  },
  "status": "archived"
}